After a lot of frustration, I've finally cracked my local Windows 10 password using mimikatz to extract the proper NTLM hash.
In particular, samdump2 decrypted the SAM hive into a list of users with "blank" passwords:
samdump2 system sam -o out
I.e., admin:1001:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Conversely, mimikatz succeeded in outputting the proper NTLM hash:
mimikatz # lsadump::sam /system:C:\system /sam:C:\sam
I.e.,
RID : 000003e9 (1001)
User : admin
Hash NTLM: f1320e0960da374b88e40cffbec44885
The problem with mimikatz is that AVs flag it as malware the moment it gets download.
Are there other tools available that can run on Linux that may decrypt the SAM file properly after Windows 10 anniversary update?